Report on Hong Kong SME Cloud Adoption, Security & Privacy Readiness Survey

Size: px
Start display at page:

Download "Report on Hong Kong SME Cloud Adoption, Security & Privacy Readiness Survey"

Transcription

1 Report on Hong Kong SME Cloud Adoption, Security & Privacy Readiness Survey Produced by Internet Society Hong Kong and Cloud Security Alliance (Hong Kong & Macau Chapter) Sponsored by Microsoft Hong Kong Jointly compiled by Chester Soong, Chairman, Internet Society Hong Kong Claudius Lam, Chairman, Cloud Security Alliance Hong Kong and Macau Chapter May 20, 2015 Copyright in this report is held jointly by Internet Society Hong Kong, Cloud Security Alliance (HK & Macau Chapter) and Microsoft Hong Kong. 1

2 Table of Contents Executive Summary... 3 Introduction and Background... 5 Survey mechanism and technical information... 5 Findings and recommendations... 6 Policy design... 6 Findings... 6 Recommendations... 6 Physical security... 7 Findings:... 7 Recommendations:... 7 Data privacy management... 8 Findings:... 8 Recommendations:... 8 System management... 9 Findings:... 9 Recommendations:... 9 Incident management Findings: Recommendations: Cloud technology adoption and application Findings: Recommendations: Understand SMEs readiness on privacy protection when using Cloud services Findings: Recommendations: Conclusion Appendix I Survey Questionnaire Appendix II - Statistics and Charts Appendix III ISO27018 background information

3 Executive Summary In March 2015, the Internet Society Hong Kong (ISOC HK) and Cloud Security Alliance Hong Kong and Macau Chapter (CSA HK), with funding sponsorship from Microsoft (HK), jointly conducted the Hong Kong SMEs Cloud Adoption, Security and Privacy Readiness Survey. We have received feedback from and interviewed 168 local SMEs coming from various industries including retail, manufacturing, Information and communications, imports/exports, financial services, etc. This is the second year of a similar survey and the survey scope has been expanded this year to cover the level of understanding SMEs have regarding how their Cloud Service Providers (CSPs) protect their data privacy. Comparisons done against last year s data have also provided valuable insight on the progress of Cloud adoption status in SMEs. The questionnaire for this year s survey was focused on seven major areas of consideration for adopting Cloud computing services from the SMEs perspectives: Policy design Physical security management Data privacy management System management Incident management Cloud technology adoption and application Understanding of CSPs privacy protection policy We are encouraged to know from the survey that more than 80% of the responding SMEs have adopted some kind of Cloud services, which represented a big jump from the 51% last year. While there are many factors SMEs considered before using Cloud services, security is still among their top consideration. Compared against those who do not, SMEs using Cloud services show a remarkably higher level of security readiness in their overall data management and information security systems, as well as in their ability to handle security incidents. More than half of the SMEs who responded believed that they could rely on CSPs to provide them with the security required. This shows that data security should not be perceived as a barrier to using Cloud services; on the contrary, adopting Cloud services may be a solution to having and maintaining better overall information security. Many SME owners already have some knowledge about security with Cloud services and its execution at the level of company policy. However, on a technical level, a lot of companies are still lacking in awareness of the importance of having a security patch management policy, which is a crucial element in protection a company s system. On privacy and data protection issues, which has become one of SMEs major concern since the enactment of the Personal Data (Privacy) Ordinance PD(P)O, more than 50% of the SMEs do not want their CSPs to look at or use their data for marketing purpose but only a quarter of them know whether the CSPs will use their data or not for such purpose. 3

4 With limited resources in manpower and specialized domain knowledge, SMEs should choose reliable and secure CSPs and commercial Cloud services with appropriate product features and business models to protect their company data and property more comprehensively and effectively. International standards like ISO/IEC can help in this regard. In identifying appropriate CSPs and Cloud services to use, customers can be assured that those CSPs that demonstrate compliance with ISO/IEC standard will have strong privacy and security protections in place. This will in turn facilitate compliance by the SMEs with their privacy obligations under the PD(P)O. SMEs can also follow the Security Guidance for Critical Areas of Focus in Cloud Computing and Cloud Controls Matrix (CCM released by CSA, and the Practical Guide for Procuring Cloud Services released by Office of the Government Chief Information Officer. 4

5 Introduction and Background This 2015 Hong Kong Small and Medium-sized Enterprises (SME) Cloud Adoption, Security and Privacy Readiness Survey was conducted by the Internet Society Hong Kong and the Cloud Security Alliance Hong Kong and Macau Chapter, who commissioned the Hong Kong Productivity Council (Council) to carry out telephone interviews with SMEs (<100 employees) in Hong Kong. The process was carried out over the course of three weeks and reviewed data from the Census and Statistics Bureau. The Council successfully collected 168responses for the survey. The research covered major industry sectors in Hong Kong. The survey questionnaire was developed based on the Cloud Security Alliance Cloud Controls Matrix and international standards with questions adapted to local conditions. The survey was sponsored by Microsoft Hong Kong. Survey mechanism and technical information The survey was conducted from March 24 to April 27, 2015 targeting SMEs in Hong Kong. Survey candidates were selected from HKPC s in-house database, industry directories, and the Hong Kong Yellow Pages. Each SME was interviewed by telephone based on a structured Chinese questionnaire with 16 questions. A total of 168 questionnaires were completed at the end of the survey period. The 16 questions addressed the following areas of consideration for Cloud security: Policy design Physical security management Data privacy management System management Incident management Cloud technology adoption and application Understanding of CSPs privacy protection policy Except for the first two questions about the background of the interviewees, interviewees were asked to answer the questions using a 1 to 5 scale indicating the SME s readiness in using Cloud services. A detailed analysis of the survey responses and our recommendations can be found in the following sections according to the respective areas of consideration. 5

6 Findings and recommendations Policy design From the survey results, we can conclude that: 63% of companies surveyed have security policies in place 52% of companies surveyed have proper documentation on access rights management to data (decreased by 15%) 40% of companies surveyed perform security audit and certifications by external parties (increased by 38%) Findings We are seeing an increase in the number of companies (14% increase from last year s survey) having formal security policies in place for setting their information security blueprint. This shows companies are taking a more mature approach in planning and setting out formal information security plans and requirements. We encountered an even greater increase in the number of companies that hire external parties to conduct security audit and certification review. Since we do not expect SMEs to possess in-house security audit personnel and have limited budget for information security, this significant increase (38% increase as compared with last year s result) suggests not only that are such audits and reviews becoming more common and affordable, but also that some business owners see that being recognized with proper certifications helps to build positive image and instill confidence in their customers. On the other hand, the survey shows a decrease (15%) in respondents that have properly mapped out their data access rights management to the various roles within the organization. Although the survey did not reveal the root cause for this, we suspect that it may be due to the high level of expertise and resources required for developing and implementing a proper data access rights management hierarchy, the kind of resources SMEs lack in general. So they simply set out the security requirements in a policy and rely on the external auditor to tell them whether they are safe or need to implement specific changes to their policies. Recommendations While we see an increase in the number of SMEs having formal security policies and hiring external auditors to review their information security position, there is still room for improvement as we only see a 63% and 40% adoption respectively. Cost is probably still the largest barrier to hiring external auditors so selecting CSPs with formal security certifications and/or proof that independent third-party security audits have been performed on their infrastructure will help reduce the cost of such effort tremendously. In this way, the SME can take advantage of Cloud services and reduce their overall IT costs, whilst still assuring themselves that concerns on security and access rights have been addressed. 6

7 Physical security From the survey results, we can conclude that: 59% of the companies surveyed manage their IT systems with proper access rights and password control, as well as maintain appropriate audit trail and exercise. 49% of the companies surveyed have people or teams in charge of hardware / software maintenance, as well as support. Findings: Most companies (59% of respondents) manage their passwords, physical access rights, and IT assets properly. However, the percentage of companies adopting such controls has decreased slightly by 5% compared with last year. From another perspective, more than 40% of respondents have no or little proper physical control over their software and hardware access rights. Only 49% of respondents have designated personnel looking after hardware and software maintenance. This is a big drop (22% decrease) compared with last year. There may be many factors causing such drop with one possible cause being the higher adoption rate in Cloud services we found in this year s survey. Since the software and hardware maintenance responsibility would be shifted to the CSP, the SMEs will no longer need to manage such tasks themselves. Nevertheless, having proper access rights management and password control still remains the responsibility of the SMEs. CSPs cannot decide for them the proper access rights to be assigned to each employee or customer for each of their data and services. Using default security settings provided by vendors and CSPs is risky and it is highly possible that these settings do not fit the specific requirements of the individual SMEs. Recommendations: Using a reliable CSP can help SMEs to save on cost and effort spent on physical security management. However, the SME will still remain responsible for managing access rights, and maintaining audit trials of software and hardware access. We strongly recommend having a designated person to determine the access control matrix for employees and customers, if access by customers is allowed. Most CSPs provide user-friendly interface for setting up such access rights and audit trials for each of the services the SME may subscribe to. 7

8 Data privacy management From the survey results, we can conclude that: 56% of companies surveyed have good understanding of or have implemented data encryption; a slight increase from last year s survey (increased by 12%) 45% of companies surveyed have a data disposal policy established, which compares favorably with last year s result (increased by 13%) Findings: Most companies seem to understand the need for having proper data access right management and backup, and over half of the companies surveyed have a good understanding or have implemented data encryption. While more companies understand now the importance of having a data disposal policy, over half of the surveyed companies still need more help on that. Recommendations: Utilizing CSPs services will allow SMEs to enjoy the benefits of protecting their data through enterprise-grade infrastructure, with an affordable investment. As more and more SMEs place their company data in the Cloud, it is important for them to establish clear and concise data protection and disposal policies and ensure that the CSPs they engage have similar policies in place. 8

9 System management From the survey results, we can conclude that: 28% of the companies surveyed implemented a security patches policy, and it is not as good as last year (decreased by 33%). 71% of the companies surveyed installed firewall devices to further improve the security and it is slightly better than last year (increased by 6%) Findings: Most companies surveyed are poor in implementing security patches in a timely fashion, even though most companies have implemented firewall protection solutions. One of the reasons may be that the companies now rely on external companies to perform security patching. Recommendations: All companies are reminded that they must keep security patches updated to mitigate security risks. Companies who use the Cloud services of a CSP that has a proper security patches policy in place can significantly reduce their risk of having outdated security patches in at least that part of their overall IT infrastructure. In this regard, companies should review their vendors (and/or CSPs ) solutions and security patches policies cautiously. Companies can refer to the Threat & Vulnerability Management, as well as the Infrastructure & Virtualization Security sections of the CSA Cloud Controls Matrix V3.0 to adopt the best practices. 9

10 Incident management From the survey results, we can conclude that: 51% of the companies surveyed have established an Incident Response Plan and it s less than last year s result (decreased by 22%) 47% of the companies surveyed also have a Disaster Recovery Plan in place and this is less than last year s result as well (decreased by 25%) Findings: Roughly half of the companies have an incident response and disaster recovery plan in place. The decline in the number of companies that have such plans in place, as compared to the previous year s survey, could be due to SMEs usually having fewer resources, and therefore treating incident response and disaster recovery issues as low priority. This points to a gap for the SMEs understanding of incident response and DRP. For the companies claimed to have such measures in place, the maturity and effectiveness of their plans are questionable. Recommendations: The use of Cloud services can help companies with their incident response and disaster recovery, as most CSPs will have in-built incident response disaster recovery mechanisms in place. Nonetheless, companies will still need to have and maintain their own incident response and disaster recovery plans to meet their unique business and customer requirements, and which factors in the role of CSPs in incident response and disaster recovery. Companies will also need to keep their incident response and disaster recovery plans up-to-date, and conduct regular drills to make sure the plans can perform as designed. Again, SMEs can leverage on CSA s Security Guidance for Critical Areas of Focus in Cloud Computing and Cloud Controls Matrix (CCM) for information. 10

11 Cloud technology adoption and application From the survey results, we can conclude that: Nearly 83% of companies surveyed are using or planning to use Cloud services, indicating a big increase from last year s 55% The top two Cloud services used are and data storage, which is same as the 2014 results. In fact, nearly all companies surveyed are using in their daily operations. Top two reasons for using Cloud services are the reliability of the support from CSPs and the security functions offered by the CSPs, showing that the companies have more confident in the services and security offered by CSPs. For those who have not adopted Cloud technology, 29% are concerned about information security, compared with last year s 23%. Findings: Compared with last year, there was a big jump in the number of companies that have adopted Cloud computing solutions, with and data storage remaining the primary Cloud functions used. We also see that 61% of users chose to move to the Cloud because of the support from CSPs, and 53% believe they can rely on the security services provided by CSPs Despite most companies understanding the various benefits of Cloud computing, a small number of them (4%) still think they do not need to adopt such technology. For those who have not adopted Cloud technology, most (29%) are concerned about information security and about 23 are not familiar with Cloud computing. However the number of companies who believe Cloud services are not reliable has dropped from last year s 15% to 6% this year. Recommendations: While more companies have adopted Cloud computing in their daily operations, security remains the single most important concern of companies that are still considering whether to use Cloud services or not. While CSPs are increasingly introducing added security into their offerings, they could do more to apprise users of this. Further, as more and more CSPs introduce flexible Security-as-a-Service to their users, they need to educate the users about the importance and best practice of using such options to protect their organization. It is also important for the government or related organizations to provide a set of guidelines and/or standards to help end-user organisations to choose the right approach and pick the right Cloud service for their needs. 11

12 Understand SMEs readiness on privacy protection when using Cloud services From the survey results, we can conclude that: For those companies who use Cloud services: 69% follow the guidance from Office of the Privacy Commissioner for Personal Data (PCPD) to protect personal data 51% disagree that their CSPs look at and use their company or customer data for marketing purpose 26% do not know if their CSPs will look at and use their company or customer data for marketing purpose 49% use CSPs who do not have transparency to their users on if and when their company or customer data will be deleted or returned. 25% do not know if and when their CSPs will return or delete their company or customer data. 39% use CSPs who do not have transparency to their users on which subcontractor they are employing to handle their company or customer data 32% do not know if their CSPs have transparency to their users on which subcontractor they are employing to handle their company or customer data. 30% use CSPs who do not/likely do not comply with guidance from PCPD to protect personal data 18% do not know if their CSPs will comply with guidance from PCPD to protect personal data For those companies who do not use Cloud services, over 50% do not understand or care the impact of the privacy related questions in this session. Findings: While most of the companies (69%) claimed they follow the PD(P)O (Ordinance) from PCPD, a quarter of them (26%) do not know if their CSPs will use their data for marketing purposes. Besides, a considerable portion of companies (39%) use CSPs who do not have transparency to their users on which subcontractor they are employing to handle the data. Similarly some of the companies (30%) use CSPs who do not/ likely do not follow the Ordinance and this raises a significant concern as CSPs are also data processors of the companies. The companies will still be held accountable if there is any personal data breach by their CSPs. In additional, nearly half of the companies (49%) use CSPs who do not have transparency to their users if and when their data can be deleted and returned. They might face difficulty when they want to unsubscribe from the Cloud services as the CSPs might not be able to return or securely delete their data. 12

13 Recommendations: More education is needed to raise awareness among SMEs of the need to understand the CSPs' service terms on data privacy protection before signing up to the CSPs Cloud services. Such awareness is especially important for SMEs intending to use the Cloud services of CSPs that rely on the use of customer data for other purposes (e.g. ad delivery and/or marketing) to support their business model and provide free services. For SMEs who are using Cloud service already, they are encouraged to revisit the service terms of the CSPs to avoid misunderstanding, in particular the terms related to the use of their data for other purposes. To avoid vendor lock-in, SMEs should be clear on the CSPs policies for data retention and deletion, including for when the SMEs unsubscribe from the Cloud services in question. This is also important to support the implementation of SMEs own data disposal policy vis-à-vis the SME s customers. (Please refer to Data Privacy Management) Moreover, it is sometimes hard for SMEs to know which CSPs follow the Ordinance or similar international legislations to protect their personal data. It is recommended that SMEs should look for CSPs who comply with international standards like ISO27018 which provides guidelines for CSPs concerning the protection of Personally Identifiable Information. 13

14 Conclusion The adoption of Cloud services has increased substantially over the year with more that 80% of companies surveyed using such services in their daily operations. With more multinational companies and government agencies implementing their Cloud computing solutions services to take advantage of the cost-reductions and advanced technologies associated with such solutions, SMEs have also begun to realize the flexibility, affordability and security that Cloud computing brings. While security remained SMEs a major concern in using Cloud services, more than half of the SMEs believed that they can rely on the CSPs to provide the security for them. As a result of the higher Cloud services adoption rate, only less than half of the SMEs surveyed are still hiring designated personnel to take care of hardware and software maintenance, a drop of 22% compared with last year. The other major concern for SMEs when using Cloud services is data privacy. After the enactment of the PC(P)O, about 70% of the SMEs have policies to comply the Ordinance. However, a quarter of the SMEs surveyed are not sure how their CSPs would use their data. Hence, when SMEs choose their CSPs, they need to ensure their CSPs can help them protect data privacy and personal data from both technical features and the business model perspectives. Where SMEs do not have the sufficient expertise to ascertain which CSPs can protect the privacy of their data, reliance on international standards, such as ISO/IEC 27018, can help such SMEs choose appropriate CSPs. The results of this Cloud Adoption, Security and Privacy Readiness Survey give a positive outlook for Cloud technology. Most of the respondents have indicated they are aware of the security requirements of adopting such technology, and many of such SMEs are already using many types and/or the subsets of Cloud services. But as we all know in the practical world, technology is always on the move and more can be done to raise awareness among SMEs of the benefits of Cloud services to allow such services to be more easily and confidently adopted by SMEs, especially considering that such businesses would benefit most from the use of such services. 14

15 About the Cloud Security Alliance Hong Kong and Macau Chapter The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. CSA is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. The CSA Hong Kong and Macau Chapter is launched in 2012 by a group of local IT professionals, to further expand its presence and focus in Asia-Pacific, About the Internet Society Hong Kong Internet Society Hong Kong (ISOC HK) is the local chapter organization of the Internet Society (ISOC), which is an international and not-for-profit membership society. ISOC HK was formed in 2005 by local veteran Internet professionals with the mission to improve the practice of Internet governance and online civil society in Hong Kong. Consistent with the ISOC statement of purpose, ISOC HK believes in maintaining and extending the development and availability of the Internet and its associated technologies and applications both as an end in itself, and as a means of enabling organizations, professions, and individuals locally and worldwide to more effectively collaborate, cooperate, and innovate in their respective fields and interests. About Microsoft Founded in 1975, Microsoft (Nasdaq MSFT ) is the worldwide leader in software, services and solutions that help people and businesses realize their full potential. The Cloud Security Alliance ("CSA") and Internet Society Hong Kong ("ISOC") with funding sponsorship from Microsoft Hong Kong, have designed and created this 2015 Hong Kong SME Cloud Adoption, Security and Privacy Readiness Survey (the Work ) primarily as an educational resource. The CSA, ISOC and Microsoft make no claim, representation or warranty that: (i) the Work is comprehensive or fit for any particular purpose; or (ii) the use of the Work or any part thereof will assure or result in a successful implementation of any Cloud computing solution or a successful business outcome. 15

16 Appendix I Survey Questionnaire 香港中小企雲端應用, 保安及私隱就緒程度調查 問卷 Hong Kong SME Cloud Security & Privacy Readiness Survey - Questionnaire 調查簡介 您好! 香港互聯網協會及香港生產力促進局正進行一項有關雲端應用及保安就緒程度的調查 現誠邀 閣下參與 是次調查可於 10 分鐘內完成 A. 公司資料確認 1. 貴公司主要業務為.. ( 只可單選 ) (Q1) 1. 製造 2. 進出口貿易及批發 3. 零售 4. 住宿及膳食服務 5. 資訊及通訊 6. 金融及保險 7. 專業服務 ( 包括法律 會計 顧問服務 廣告 室內設計 速遞服務 ) 8. 地產 ( 包括地產經 紀 裝修 ) 9. 其他 ( 請註明 ).. 2. 貴公司現時於香港辦公室之總員工人數.. (Q2) ( 註..中小企業 = 於香港聘用 名員工 ; 如受訪公司未能符合上述定義, 需終止訪問 ) 於以下部份, 請就有關句子, 於 4 個答案選項中, 選出最符合貴公司現時情況的一個選項 B. 公司整體資訊保安政策 (Policy Design) 句子 答案選項 完全不符合 (1) 少部份符合 (2) 大部份符合 (3) 完全符合 (4) 3. 公司具備正式的資訊保安措施, 以監 察 審核及持續提升全公司的資訊保安 水平 4. 公司的資訊保安措施, 每年均會由外間 獨立機構 / 人士透過審計 (Auditing) 或再續証 (Certification) 等過程, 進行 檢視 5. 公司具備守則文件, 闡述不同崗位員工 的資訊存取權限, 並指示如何處理離職 或內部轉職員工之資訊存取權, 包括刪 16

17 除及更改存取權 C. 實體保安管理 (Physical Security Management) 句子 答案選項 完全不符合 (1) 少部份符合 (2) 大部份符合 (3) 完全符合 (4) 6. 公司透過一系列措施, 包括為不同崗 位員工制定使用權限 採用密碼 保 存使用記錄或進行審計等, 以便中央 管理公司的資訊科技系統 ( 如伺服 器 ) 7. 公司有專責職員管理內部資訊科技資 產, 包括中央監察相關軟硬件的保養 期, 及中央統籌相關軟硬件的支援 D. 數據保安管理 (Data Privacy Management) 句子 答案選項 完全不符合 (1) 少部份符合 (2) 大部份符合 (3) 完全符合 (4) 8. 公司有採用數據加密技術於資訊系統 上, 以加強保護內部資料數據, 防止 外洩, 並定期檢視數據保安情況 9. 公司具備守則文件以指示員工銷毀內 部數據, 並會保留數據銷毀紀錄, 以 及定期檢討數據銷毀過程 E. 系統管理 (System Management) 句子 答案選項 完全不符合 (1) 少部份符合 (2) 大部份符合 (3) 完全符合 (4) 10. 內部專責職員通常於修補程式 (Patch) 發佈後的一段固定時間內 ( 如發佈後一個月內 ), 測試修補程 式 通過測試後, 修補程式會被自動安 裝於公司所有連接網絡的電腦內 11. 除了使用互聯網服務供應商的防火牆 外, 公司亦自行裝設額外防火牆 ( 硬 17

18 件或軟件 ) 以加強保護 公司會中央管 理該防火牆, 並會定期為該防火牆進行 審計工作 F. 事故處理 (Incident Management) 句子 答案選項 完全不符合 (1) 少部份符合 (2) 大部份符合 (3) 完全符合 (4) 12. 公司具備守則文件以指示員工處理內部 資訊保安事故 ( 例如電腦失竊 資料外 洩 ) 公司亦會定期檢視 測試及更新 相關守則 13. 公司備有災難復原計劃 (Disaster Recovery Plan) 備用電腦和備份數 據庫, 以便於資訊保安事故後, 盡快恢 復公司運作 公司亦定期檢視和測試災 難復原計劃 G. 雲端資訊科技應用情況 (Cloud Technology Application) 14. 貴公司有否使用任何雲端資訊科技應用方案 ( 雲端資訊科技應用 定義..讓中小企透過互聯網和流動網絡, 以相對低廉的起動成本, 採用切合其運作規模的資訊科技應用 出自立法會 )? 可選(A) (B) 或 (C) (A) 現正使用, 請註明 ( 可選多項 ).. 電郵 (1) 辦公室協作工具 (2) 銷售 (3) 客戶關係管理 (4) 資料存儲 (5) 財務 (6) 企業資源規劃 (7) 人力資源管理 (8) 數據運算 (9) 軟件開發 (10) 軟件測試 (11) 其他 ( 請註明 ).. (12) 18

19 完成選擇後, 往 (a) (B) 現在沒有使用, 但正考慮 / 研究相關方案 往 (f) (C) 現在沒有使用, 短期內亦不考慮 往 (f) 句子 答案選項 完全不符合 (1) 少部份符合 (2) 大部份符合 (3) 完全符合 (4) (a) 你的公司已經遵循本地私隱專員的指 (5) = 不確 引, 以保護個人資料? 定 / 沒有意 見 (b) 你已經同意雲端服務供應商可以查看 (5) = 不確 和使用您公司或客戶的信息於廣告或 定 / 沒有意 促銷的用途? 見 (c) 你的雲端服務供應商已經提供明確的 (5) = 不確 時間表於何時退回或刪除您公司或客 定 / 沒有意 戶的信息? 見 (d) 你的雲端服務供應商已經透明地提供 (5) = 不確 有可能將處理您的公司或客戶信息的 定 / 沒有意 外判商身份? 見 (e) 你的雲端服務供應商已經遵循本地私 (5) = 不確 隱專員的指引, 以保護個人資料? 定 / 沒有意 見 15. 請闡述使用雲端資訊科技應用方案的原因 ( 可選多項 ).. 起首的投資較少 ( 軟 / 硬件 )(1) 費用投資方面的彈性較大 (2) 可倚賴方案供應商的支援 (3) 可倚賴方案供應商的資訊保安功能 (4) 雲端服務的系統比較自己的系統穩定 (5) 費用投資方面的彈性較大 (6) 可享用最新科技 (7) 其他 ( 請註明 ).. (8) 完成問卷 19

20 句子 答案選項 完全不符合 (1) 少部份符合 (2) 大部份符合 (3) 完全符合 (4) (f) 你的公司已經遵循本地私隱專員的指 (5) = 不確 引, 以保護個人資料? 定 / 沒有意 見 (g) 你會同意雲端服務供應商可以查看和 (5) = 不確 使用您公司或客戶的信息於廣告或促 定 銷的用途? (h) 你會要求你的雲端服務供應商提供明 (5) = 不確 確的時間表於何時退回或刪除您公司 定 / 沒有意 或客戶的信息? 見 (i) 你會要求你的雲端服務供應商透明地 (5) = 不確 提供有可能將處理您的公司或客戶信 定 / 沒有意 息的外判商身份? 見 (j) 你會要求你的雲端服務供應商遵循本 (5) = 不確 地私隱專員的指引, 以保護個人資 定 / 沒有意 料? 見 16. 請闡述不使用雲端資訊科技應用方案的原因 ( 可選多項 ).. 對雲端資訊科技不太認識 ) (1) 資訊保安的考慮 (2) 感覺上, 雲端服務不太穩定 (3) 害怕雲端服務供應商倒閉, 因而損失正使用的雲端方案中的數據 (4) 害怕雲端服務供應商倒閉, 因而損失所繳費用 (5) 害怕雲端服務供應商查看或使用您公司或客戶的信息於其他用途 (6) 其他 ( 請註明 ).. (7) 完成問卷 問卷完 20

21 Appendix II - Statistics and Charts 21

22 22

23 23

24 24

25 25

26 26

27 27

28 28

29 29

30 30

31 31

32 32

33 33

34 34

35 Appendix III ISO27018 background information The new standard, ISO/IEC (ISO 27018), strengthens data privacy by adding key protections for sensitive customer information stored in the Cloud. Published July 30th, 2014 by the International Organization for Standardization (ISO), it sets forth guidelines for Cloud service providers concerning Personally Identifiable Information ( PII ). The standard was developed in consultation with contributors from 14 countries and 5 international organizations. Modernizing security and privacy in the Cloud Before ISO/IEC 27018, there wasn't a robust, internationally-recognized benchmark for protecting Cloud stored PII. The well-established ISO/IEC 27001:2013 international standard provides a flexible system for identifying information security risks and choosing controls to address them. As an addendum to ISO/IEC 27001, ISO/IEC provides specific guidance to Cloud Service Providers (CSP) for assessment of risks and implementation of state-of-the-art controls for protection of PII stored in the Cloud. Why does an international standard matter? It is critical that new guidance and controls for PII be defined in international standards. International standards provide at least three key characteristics. Trust. International standards are created according to strict rules that ensure multiple stakeholders participate in an extensive review process. Acceptance. International standards from ISO are accepted by all but a few governments as a basis for policy, procurement and trade rules. Global reach. The global acceptance of ISO standards supports cross-nation business and trade. Why does adopting ISO controls matter? A Cloud service s audited compliance with the controls in ISO/IEC gives customers an easy way to confirm that the personal information they entrust to the CSP will be used only as they approve and is kept secure. This is particularly important for government customers, who are often subject to stricter obligations to protect information in their care. The ISO/IEC standard supports regulations set by data protection authorities around the world. Since the standard incorporates the input of multiple regional regulators, use of Cloud services that comply with it demonstrates support for the requirements of many local Data Protection Authorities. This standard brings a welcome degree of uniformity to the industry, and adds needed protections to improve PII security and compliance in an increasingly Cloud-based information environment. ISO/IEC gives new, clear guidance based on EU Data Protection Authorities input on how a data processor should protect customer data, including a requirement that 35

36 providers must either not mine customer data for advertising purposes, or gain explicit consent to do so. Moreover, it must be possible for a customer to use the service without submitting to such use of personal data for advertising or marketing. ISO/IEC helps customers and CSPs by ensuring that concrete guidance and specific controls for processing PII are addressed as part of an ISO/IEC audit. Adding the guidance and controls of ISO/IEC to third-party audits provides evidence of that commitment. Cloud service providers adopting ISO/IEC must operate under six key principles: 1. Consent: CSPs must not process the personal data they receive for purposes independent of the instructions of the customer, and they must not use that personal data for advertising and marketing unless expressly instructed to do so by the customer. Moreover, it must be possible for a customer to use the service without submitting to such use of its personal data for advertising or marketing. 2. Control: Customers have explicit control of how their information is used. 3. Transparency: CSPs must inform customers where their data resides and make clear commitments about how that data is handled. 4. Accountability: The standard asserts that any breach of information security should trigger a review by the service provider to determine if there was any loss, disclosure, or alteration of PII. 5. Communication: In case of a breach, CSPs should notify customers and keep clear records about the incident and the response to it. 6. Independent and yearly audit: A successful third-party audit of a CPS s compliance documents the service s conformance with the standard, and can then be relied upon by the customer to support their own regulatory obligations. To remain compliant, the CSP must subject itself to yearly third party reviews. A Cloud service provider s adherence to ISO/IEC controls means the following: Customers will always know where their data may be stored and who is processing that data. Customers are sometimes subject to information security rules that restrict where data can be stored. Because ISO/IEC requires certified CSPs to inform customers of the countries where their data may be stored, customers will have the visibility they need to ensure compliance with applicable rules. The standard also requires CSPs to be upfront about the identities of any subcontractors they engage to help with processing PII before customers enter into a contract. And if any of these changes, the CSP is required to inform customers promptly to give them an opportunity to object or terminate their agreement. Customers won t need to worry that the CSP will use their information for marketing and advertising without their consent. Some CSPs use Cloud customer data for their own independent commercial purposes, including for targeted advertising. To make sure that the customer is always in control, ISO/IEC compliant CSPs may not use customer data for advertising or marketing purposes absent explicit consent from the customer, which cannot be a condition for receiving the Cloud service. The choice should always be with the customers. 36

37 Customers can be confident that the CSP will be transparent about its ability to return, transfer, or securely dispose of any personal data at their request. Customers are often concerned that Cloud services will lead to lock in, reducing flexibility and nimbleness over time and creating a system captive to a single standard, software tool, or system. ISO/IEC requires the CSP to implement a policy to allow for the return, transfer and/or secure disposal of personal information, within a reasonable period of time. Customers can rely on ISO/IEC compliant CSPs to help them to handle access, correction or deletion requests. EU data protection law imposes certain requirements on CSPs including allowing individuals whose personal information they hold to access that information, to correct it, and even to delete it. Fulfilling these obligations can be a challenging task where an organization has its data stored in a thirdparty s Cloud. The compliant providers are required to help customers meet these obligations. Customers can rely on ISO/IEC compliant CSPs to notify them in the event of a security incident resulting in unauthorized PII disclosure, and to help them comply with their notification obligations. The compliant providers must specify how quickly they will notify their customers of an unauthorized disclosure of PII and how they will help their customers fulfill their notification obligations. ISO/IEC also requires CSPs to record the type, timing and consequences of any security incidents, to whom the incident was reported, the steps taken to resolve the incident, etc. creating a record that will in turn assist customers in meeting their reporting obligations. Customers can be confident that an ISO/IEC compliant CSP will only comply with legally binding requests for disclosure of their data. The CSP will reject any requests for the disclosure of customers personal data that are not legally binding. And if it needs to comply with a legally binding disclosure request (e.g., in relation to criminal investigations), it must always notify the relevant customer, unless prohibited from doing so by law. Customers can rely on independent third party verification of the principles above. In order to be verified as ISO/IEC compliant, CSPs must go through a rigorous ISO/IEC certification process by an accredited independent certification body. To remain compliant, the CSP must subject itself to yearly third-party reviews. An ISO/IEC compliant provider is required to provide customers prior to commencement of and for the duration of the contract with independent evidence that controls are implemented in accordance with its policies. 37

港專單一登入系統 (SSO) 讓本校的同學, 全日制及兼職老師只要一個登入帳戶, 便可同時使用由本校提供的網上系統及服務, 包括 Blackboard 網上學習平台, 港專電郵服務, 圖書館電子資料庫及其他教學行政系統.

港專單一登入系統 (SSO) 讓本校的同學, 全日制及兼職老師只要一個登入帳戶, 便可同時使用由本校提供的網上系統及服務, 包括 Blackboard 網上學習平台, 港專電郵服務, 圖書館電子資料庫及其他教學行政系統. 港專單一登入系統 (SSO) 讓本校的同學, 全日制及兼職老師只要一個登入帳戶, 便可同時使用由本校提供的網上系統及服務, 包括 Blackboard 網上學習平台, 港專電郵服務, 圖書館電子資料庫及其他教學行政系統. 港專單一登入網站網址 http://portal.hkct.edu.hk (HKCT 之教職員, 學生 ) http://portal.ctihe.edu.hk (CTIHE 之教職員,

More information

Oxford isolution. 下載及安裝指南 Download and Installation Guide

Oxford isolution. 下載及安裝指南 Download and Installation Guide Oxford isolution 下載及安裝指南 Download and Installation Guide 系統要求 個人電腦 Microsoft Windows 10 (Mobile 除外 ) Microsoft Windows 8 (RT 除外 ) 或 Microsoft Windows 7 (SP1 或更新版本 ) ( 網上下載 : http://eresources.oupchina.com.hk/oxfordisolution/download/index.html)

More information

PC Link Mode. Terminate PC Link? Esc. [GO]/[Esc] - - [GO]/[Esc] 轉接座未放滿. Make auto accord with socket mounted? [GO]/[Esc] Copy to SSD E0000

PC Link Mode. Terminate PC Link? Esc. [GO]/[Esc] - - [GO]/[Esc] 轉接座未放滿. Make auto accord with socket mounted? [GO]/[Esc] Copy to SSD E0000 Start SU-6808 EMMC Programmer V.0bd7 [ ]Link PC / [ ]Menu [ ] >.Select project.make new project.engineer mode.reset counter 5.Link to PC [ ] PC disconnected PC connected Select project SEM0G9C_A.prj Terminate

More information

UAK1-C01 USB Interface Data Encryption Lock USB 資料加密鎖. Specifications for Approval

UAK1-C01 USB Interface Data Encryption Lock USB 資料加密鎖. Specifications for Approval Product Definition C-MING Product Semi-finished Product OEM/ODM Product Component USB Interface Data Encryption Lock USB 資料加密鎖 Specifications for Approval Approval Manager Issued By Revision History Revision

More information

一般來說, 安裝 Ubuntu 到 USB 上, 不外乎兩種方式 : 1) 將電腦上的硬碟排線先予以排除, 將 USB 隨身碟插入主機, 以一般光碟安裝方式, 將 Ubuntu 安裝到 USB

一般來說, 安裝 Ubuntu 到 USB 上, 不外乎兩種方式 : 1) 將電腦上的硬碟排線先予以排除, 將 USB 隨身碟插入主機, 以一般光碟安裝方式, 將 Ubuntu 安裝到 USB Ubuntu 是新一代的 Linux 作業系統, 最重要的是, 它完全免費, 不光是作業系統, 連用軟體都不必錢 為什麼要裝在 USB 隨身碟上? 因為, 你可以把所有的軟體帶著走, 不必在每一台電腦上重新來一次, 不必每一套軟體裝在每一台電腦上都要再一次合法授權 以下安裝方式寫的是安裝完整的 Ubuntu- 企業雲端版本 V. 11.10 的安裝過程, 若是要安裝 Desktop 版本, 由於牽涉到

More information

Figure 1 Microsoft Visio

Figure 1 Microsoft Visio Pattern-Oriented Software Design (Fall 2013) Homework #1 (Due: 09/25/2013) 1. Introduction Entity relation (ER) diagrams are graphical representations of data models of relation databases. In the Unified

More information

SSL VPN User Manual (SSL VPN 連線使用手冊 )

SSL VPN User Manual (SSL VPN 連線使用手冊 ) SSL VPN User Manual (SSL VPN 連線使用手冊 ) 目錄 前言 (Preface) 1. ACMICPC 2018 VPN 連線說明 -- Pulse Secure for Windows ( 中文版 ):... 2 2. ACMICPC 2018 VPN 連線說明 -- Pulse Secure for Linux ( 中文版 )... 7 3. ACMICPC 2018

More information

Citrix CloudGateway. aggregate control. all apps and data to any device, anywhere

Citrix CloudGateway. aggregate control. all apps and data to any device, anywhere Citrix CloudGateway aggregate control all apps and data to any device, anywhere Agenda 1. What s Cloud Gateway? 2. Cloud Gateway Overview 3. How it works? What s Cloud Gateway? It s all about the apps

More information

桌上電腦及筆記本電腦安裝 Acrobat Reader 應用程式

桌上電腦及筆記本電腦安裝 Acrobat Reader 應用程式 On a desktop or notebook computer Installing Acrobat Reader to read the course materials The Course Guide, study units and other course materials are provided in PDF format, but to read them you need a

More information

全面強化電路設計與模擬驗證. Addi Lin / Graser 2 / Sep / 2016

全面強化電路設計與模擬驗證. Addi Lin / Graser 2 / Sep / 2016 全面強化電路設計與模擬驗證 Addi Lin / Graser 2 / Sep / 2016 Agenda OrCAD Design Solution OrCAD Capture 功能應用 OrCAD Capture CIS 介紹 OrCAD PSpice 模擬與驗證 OrCAD Design Solution Powerful and Widely Used Design Solution Front-to-Back

More information

現代化資料中心必備資料隨處保護機制 首席技術顧問藍基能 GLOBAL SPONSORS

現代化資料中心必備資料隨處保護機制 首席技術顧問藍基能 GLOBAL SPONSORS 現代化資料中心必備資料隨處保護機制 首席技術顧問藍基能 GLOBAL SPONSORS 1 I/T 的二個世界 這是一個最好的年代 ; 也是最壞的年代 Traditional Apps IT On Premise Next Gen Apps Developers Cloud You Need Both for Trust and Agility 2 EMC 現代化資料中心的策略 PROTECTION

More information

購票流程說明 How To purchase The Ticket?

購票流程說明 How To purchase The Ticket? 購票流程說明 How To purchase The Ticket? 步驟 1: 點選 登入 Click 登入 Login (You have to login before purchasing.) 步驟 2: 若已是會員請填寫會員帳號 密碼, 點選 登入 若非會員請點選 註冊 If you are the member of PB+, Please login. If not, please register.

More information

Information is EVERYTHING 微軟企業混和雲解決方案. November 24, Spenser Lin. Cloud Infra Solution Sales, Microsoft Taiwan

Information is EVERYTHING 微軟企業混和雲解決方案. November 24, Spenser Lin. Cloud Infra Solution Sales, Microsoft Taiwan Information is EVERYTHING 微軟企業混和雲解決方案 November 24, 2016 Spenser Lin Cloud Infra Solution Sales, Microsoft Taiwan Value to business Applications and services drive future IT business value Efficiency Innovation

More information

The notice regarding Participation Ways of our global distributor video conference on Feb. 5.

The notice regarding Participation Ways of our global distributor video conference on Feb. 5. The notice regarding Participation Ways of our global distributor video conference on Feb. 5. On Feb.5, 2010 Los Angeles time, between 5:00 PM - 7:00 PM, we will convene an important global distributor

More information

EZCast Docking Station

EZCast Docking Station EZCast Docking Station Quick Start Guide Rev. 2.00 Introduction Thanks for choosing EZCast! The EZCast Docking Station contains the cutting-edge EZCast technology, and firmware upgrade will be provided

More information

EdConnect and EdDATA

EdConnect and EdDATA www.hkedcity.net Tryout Programme of Standardised Data Format for e-textbook and e-learning Platform EdConnect and EdDATA 5 December 2018 Agenda Introduction and background Try-out Programme Q&A 電子課本統一數據格式

More information

EZCast Wire User s Manual

EZCast Wire User s Manual EZCast Wire User s Manual Rev. 2.01 Introduction Thanks for choosing EZCast! The EZCast Wire contains the cutting-edge EZCast technology, and firmware upgrade will be provided accordingly in order to compatible

More information

外薦交換生線上申請系統操作說明 Instruction on Exchange Student Online Application System. [ 中文版 ] [English Version]

外薦交換生線上申請系統操作說明 Instruction on Exchange Student Online Application System. [ 中文版 ] [English Version] 外薦交換生線上申請系統操作說明 Instruction on Exchange Student Online Application System [ 中文版 ] [English Version] 線上申請流程說明 申請系統網址 : http://schwebap.nccu.edu.tw/zeweb/exgstdapply/ 1. 建立新帳號 : 請輸入姓名 生日 email 做為未來登入系統用

More information

EZCast Wire. User s Manual. Rev. 2.00

EZCast Wire. User s Manual. Rev. 2.00 EZCast Wire User s Manual Rev. 2.00 Introduction Thanks for choosing EZCast! The EZCast Wire contains the cutting-edge EZCast technology, and firmware upgrade will be provided accordingly in order to compatible

More information

InTANK ir2771-s3 ir2772-s3. User Manual

InTANK ir2771-s3 ir2772-s3. User Manual InTANK ir2771-s3 ir2772-s3 User Manual » InTANK...1» InTANK ir2771-s3 & ir2772-s3 產品使用說明... 10 V1.1 Introduction Thank you for purchasing RAIDON products. This manual will introduce the InTANK ir2771-s3

More information

CLAD 考前準備 與 LabVIEW 小技巧

CLAD 考前準備 與 LabVIEW 小技巧 CLAD 考前準備 與 LabVIEW 小技巧 NI 技術行銷工程師 柯璟銘 (Jimmy Ko) jimmy.ko@ni.com LabVIEW 認證 Certified LabVIEW Associate Developer (LabVIEW 基礎認證 ) Certified LabVIEW Associate Developer LabVIEW 全球認證 40 題 (37 題單選,3 題複選

More information

Chapter 7. Digital Arithmetic and Arithmetic Circuits. Signed/Unsigned Binary Numbers

Chapter 7. Digital Arithmetic and Arithmetic Circuits. Signed/Unsigned Binary Numbers Chapter 7 Digital Arithmetic and Arithmetic Circuits Signed/Unsigned Binary Numbers Signed Binary Number: A binary number of fixed length whose sign (+/ ) is represented by one bit (usually MSB) and its

More information

購票流程說明 How To purchase The Ticket?

購票流程說明 How To purchase The Ticket? 購票流程說明 How To purchase The Ticket? 步驟 1: 已是會員請點選 登入, 選擇 2016 WTA 臺灣公開賽 Taiwan Open tickets Step1:If You are the member, please Click 登入 Click to the column: 2016 WTA 臺灣公開賽 Taiwan Open tickets Click 登入

More information

Lotusphere Comes to You 輕鬆打造 Web 2.0 入口網站 IBM Corporation

Lotusphere Comes to You 輕鬆打造 Web 2.0 入口網站 IBM Corporation 輕鬆打造 Web 2.0 入口網站 2007 IBM Corporation 議程 Web 2.0 新特性一覽 Web 2.0 入口網站主題開發 用戶端聚合技術 PortalWeb2 主題 開發 AJAX portlets 程式 總結 JSR 286 及 WSRP 2.0 對 AJAX 的支援 AJAX 代理 用戶端 portlet 編程模型 Web 2.0 特性一覽 WP 6.1 提供的 Web

More information

C A R I T A S M E D I C A L C E N T R E 明愛醫院 Rev. (A) (B) (C) (D) D A T A A C C E S S R E Q U E S T ( D A R ) 查閱資料要求申請須知

C A R I T A S M E D I C A L C E N T R E 明愛醫院 Rev. (A) (B) (C) (D) D A T A A C C E S S R E Q U E S T ( D A R ) 查閱資料要求申請須知 C A R I T A S M E D I C A L C E N T R E 明愛醫院 Rev. D A T A A C C E S S R E Q U E S T ( D A R ) 查閱資料要求申請須知 18 June 2017 (A) (B) (C) Under normal circumstances, the requested personal data will be sent to

More information

Version Control with Subversion

Version Control with Subversion Version Control with Subversion 指導教授郭忠義 邱茂森 95598051 1 Table of contents (1) Basic concepts of subversion (1)What is Subversion (2)Version Control System (3)Branching and tagging (4) Repository and Working

More information

Twin API Guide. How to use Twin

Twin API Guide. How to use Twin Twin API Guide How to use Twin 1 目錄 一 Cycle Job------------------------------------------------------------------------------------P3 二 Twin Action Table-----------------------------------------------------------------------P4-5

More information

Multimedia Service Support and Session Management 鍾國麟

Multimedia Service Support and Session Management 鍾國麟 Multimedia Service Support and Session Management 鍾國麟 2003-9-31 1 1 Agenda Introduction What is Session? Definition Functions Why need Session Management 2G,Internet,3G SIP Basic Operation User Location

More information

Preamble Ethernet packet Data FCS

Preamble Ethernet packet Data FCS Preamble Ethernet. packet Data FCS Destination Address Source Address EtherType Data ::: Preamble. bytes. Destination Address. bytes. The address(es) are specified for a unicast, multicast (subgroup),

More information

私有雲公有雲的聯合出擊 領先的運算, 儲存與網路虛擬化技術 靈活的計費模式與經濟性 支援廣大的商業應用場景 涵蓋各類型雲服務 類標準的企業資料中心架構 全球規模與快速部署. 聯合設計的解決方案可為客戶提供最佳的 VMware 和 AWS

私有雲公有雲的聯合出擊 領先的運算, 儲存與網路虛擬化技術 靈活的計費模式與經濟性 支援廣大的商業應用場景 涵蓋各類型雲服務 類標準的企業資料中心架構 全球規模與快速部署. 聯合設計的解決方案可為客戶提供最佳的 VMware 和 AWS 私有雲公有雲的聯合出擊 領先的運算, 儲存與網路虛擬化技術 支援廣大的商業應用場景 類標準的企業資料中心架構 靈活的計費模式與經濟性 涵蓋各類型雲服務 全球規模與快速部署 聯合設計的解決方案可為客戶提供最佳的 VMware 和 AWS VMware Cloud on AWS 使用場景 A B C D 雲端遷移資料中心延伸災難備援次世代應用程式 Consolidate Migrate Maintain

More information

晶焱科技股份有限公司 Amazing Microelectronic Corp.

晶焱科技股份有限公司 Amazing Microelectronic Corp. 晶焱科技股份有限公司 Amazing Microelectronic Corp. ESD Leading Provider 公司簡介 2 公司沿革 AmazingIC Founded in Taiwan 1 Billion (pcs) shipment Amazing IPO in Taiwan 1.Touch down 10 Billion pcs 2.AVL Touch down 23 billion

More information

第九章結構化查詢語言 SQL - 資料定義語言 (DDL) 資料庫系統設計理論李紹綸著

第九章結構化查詢語言 SQL - 資料定義語言 (DDL) 資料庫系統設計理論李紹綸著 第九章結構化查詢語言 SQL - 資料定義語言 (DDL) 資料庫系統設計理論李紹綸著 SQL 的資料定義語言 本章內容 建立資料表 修改資料表 刪除資料表 FOREIGN KEY 外鍵條件約束與資料表關聯性 2 資料定義語言可分為下列三種 : SQL 的資料定義語言 CREATE TABLE 指令 : 用來建立一個基底關聯表, 和設定關聯表相關的完整性限制 CREATE VIEW 指令 : 用來建立一個視界,

More information

香港中文大學學生會計算機科學系會 圖書清單

香港中文大學學生會計算機科學系會 圖書清單 香港中文大學學生會計算機科學系會 圖書清單 100 Theory 120 CGI 140 Visual Basic 160 Other Programming Book 101 Program budgeting and benefit-cost analysis 102 Introduction to Algorithms 103 Introduction to Algorithms 104 Data

More information

步驟 1: 首頁以 facebook 或 google 帳號登入, 並點選節目 Step 1:Log in with your facebook/google account, then click the show banner.

步驟 1: 首頁以 facebook 或 google 帳號登入, 並點選節目 Step 1:Log in with your facebook/google account, then click the show banner. 步驟 1: 首頁以 facebook 或 google 帳號登入, 並點選節目 Step 1:Log in with your facebook/google account, then click the show banner. 步驟 2: 填寫會員資料 Step 2:Fill out the membership form. Name ID No. Male/female Foreigner

More information

Frame Relay 訊框中繼 FRSW S0/0 S0/1

Frame Relay 訊框中繼 FRSW S0/0 S0/1 Frame Relay 訊框中繼 將路由器設定為訊框中繼交換器以進行 frame relay 實驗 : 首先練習設定兩個埠的 frame relay switch FRSW S0/0 S0/1 介面 S0/0 介面 S0/1 102 201 DLI 102 DLI 201 Router(config)# hostname FRSW FRSW(config)# frame-relay switching

More information

C B A B B C C C C A B B A B C D A D D A A B D C C D D A B D A D C D B D A C A B

C B A B B C C C C A B B A B C D A D D A A B D C C D D A B D A D C D B D A C A B 高雄市立右昌國中 106 學年度第二學期第二次段考三年級考科答案 國文科 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. C B D C A C B A D B 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. D C B A D C A B D B 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. C B D C B B C

More information

Scale of Fees (Applicable from 18 June 2017) Data Access Request consists of (i) Data Enquiry Request and (ii) Copy of Personal Medical Records

Scale of Fees (Applicable from 18 June 2017) Data Access Request consists of (i) Data Enquiry Request and (ii) Copy of Personal Medical Records Grantham Hospital Health Information & Records Office G/F, Main Block, 125 Wong Chuk Hang Road, Aberdeen, Hong Kong Tel.: 2518 2203 Fax: 2555 7319 Opening hours: Monday - Friday: 9 a.m. to 1 p.m. and 2:00

More information

微軟商務用 Skype 雲端視訊會議及與所需頻寬介紹

微軟商務用 Skype 雲端視訊會議及與所需頻寬介紹 微軟商務用 Skype 雲端視訊會議及與所需頻寬介紹 傳統視訊會議 : 視訊會議解決方案 以硬體設備為主, 內建專屬視訊會議軟體, 要增加連線數量就必須加購昂貴的 MCU Server, 整套設備的價格多在數百萬之譜 軟體式視訊會議 : 在現有的基礎設備上, 強化整合通訊功能 (UC), 再結合視訊會議功能 (VC, Video Conference), 對於公司的網路系統或是通訊系統做更有效率的運用

More information

InTANK ir2622 User Manual

InTANK ir2622 User Manual InTANK ir2622 User Manual » InTANK...1» InTANK ir2622 產品使用說明... 12 V1.2 » InTANK Introduction Thank you for purchasing RAIDON products. This manual will introduce the InTANK ir2622 Series. Before using

More information

研華公司 H 營運成果與財務報告

研華公司 H 營運成果與財務報告 研華公司 2018 1H 營運成果與財務報告 2018 年 8 月 09 日綜合經營管理總經理陳清熙 Eric.chen@advantech.com.tw Safe Harbor Notice This presentation contains forward-looking statements and is subject to risks and uncertainties. Actual

More information

Increase Productivity and Quality by New Layout Flow

Increase Productivity and Quality by New Layout Flow Increase Productivity and Quality by New Layout Flow Jonathan / Graser 16 / Oct / 2015 Design Process Introduction CONSTRAINTS PLACEMENT FANOUT BREAKOUT ROUTING DELAY (ATE) NET-GROUP Topology & Delay Physical

More information

The transformation relationship between defense enterprise architecture and C4ISR system architecture

The transformation relationship between defense enterprise architecture and C4ISR system architecture The transformation relationship between defense enterprise architecture and C4ISR system architecture Dr. Meng-chyi Harn 報告人 : 韓孟麒博士德明財經科技大學資訊科技系 C4ISR 研究中心 Introducing Takming Outline Introduction Fundamental

More information

描述性資料採礦 Descriptive Data Mining

描述性資料採礦 Descriptive Data Mining 描述性資料採礦 Descriptive Data Mining 李御璽 (Yue-Shi Lee) 銘傳大學資訊工程學系 leeys@mail.mcu.edu.tw Agenda Cluster Analysis ( 集群分析 ) 找出資料間的內部結構 Association Rules ( 關聯規則 ) 找出那些事件常常一起出現 Sequence Clustering ( 時序群集 ) Clustering

More information

Java 程式設計基礎班 (7) 莊坤達台大電信所網路資料庫研究室. Java I/O. Class 7 1. Class 7 2

Java 程式設計基礎班 (7) 莊坤達台大電信所網路資料庫研究室. Java I/O.   Class 7 1. Class 7 2 Java 程式設計基礎班 (7) 莊坤達台大電信所網路資料庫研究室 Email: doug@arbor.ee.ntu.edu.tw Class 7 1 回顧 Java I/O Class 7 2 Java Data Structure 動態資料結構 Grow and shrink at execution time Several types Linked lists Stacks Queues Binary

More information

場次 : C3. 公司名稱 : Radware. 主題 : ADC & Security for SDDC. 主講人 : Sam Lin ( 職稱 ) 總經理

場次 : C3. 公司名稱 : Radware. 主題 : ADC & Security for SDDC. 主講人 : Sam Lin ( 職稱 ) 總經理 場次 : C3 公司名稱 : Radware 主題 : ADC & Security for SDDC 主講人 : Sam Lin ( 職稱 ) 總經理 L4-L7 ADC (appliance or NFV) and Security service (appliance or NFV ) for (Software Define) Data Center Sam Lin Radware Taiwan

More information

David M. Kroenke and David J. Auer Database Processing Fundamentals, Design, and Implementation

David M. Kroenke and David J. Auer Database Processing Fundamentals, Design, and Implementation David M. Kroenke and David J. Auer Database Processing Fundamentals, Design, and Implementation Chapter Six: Transforming Data Models into Database Designs 6-1 Chapter Objectives To understand how to transform

More information

MH-3621-U3 Clone Dual SATA HDD Docking System

MH-3621-U3 Clone Dual SATA HDD Docking System MH-3621-U3 Clone CONTENTS ABOUT THE DOCKING SYSTEM... 2 HARD DRIVE INSTALLATION GUIDE... 5 CLONE OPERATION GUIDE... 6 NOTE... 8 LIMITED WARRANTY... 10 1 Thank you for purchasing MH-3621-U3 from archgon.

More information

InTANK ir2623-s3 User Manual

InTANK ir2623-s3 User Manual InTANK ir2623-s3 User Manual » InTANK...1» InTANK ir2623-s3 產品使用說明...12 V1.0 » InTANK Introduction Thank you for purchasing RAIDON products. This manual will introduce the IR2623-S3 Series. Before using

More information

EMP2 SERIES. mpcie to Serial COM User Manual. Rev 1.3

EMP2 SERIES. mpcie to Serial COM User Manual. Rev 1.3 EMP2 SERIES mpcie to Serial COM User Manual Rev 1.3 Copyright Information Innodisk is trademark or registered trademark of Innodisk Corporation. This document is subject to change and revision without

More information

Software Architecture Case Study: Applying Layer in SyncFree

Software Architecture Case Study: Applying Layer in SyncFree Software Architecture Case Study: Applying Layer in SyncFree Chien-Tsun Chen Department of Computer Science and Information Engineering National Taipei University of Technology, Taipei 06, Taiwan ctchen@ctchen.idv.tw

More information

Operating Systems 作業系統

Operating Systems 作業系統 Chapter 7 Operating Systems 作業系統 7.1 Source: Foundations of Computer Science Cengage Learning Objectives 學習目標 After studying this chapter, students should be able to: 7.2 Understand the role of the operating

More information

SOHOTANK PD3500+ User Manual

SOHOTANK PD3500+ User Manual SOHOTANK PD3500+ User Manual » SOHORAID SR2 Series User Manual.3» SOHORAID SR2 系列產品使 用說明.. 14 2 Introduction Thank you for purchasing STARDOM products. This manual will introduce the SOHOTANK PD3500+ Series.

More information

黃河凱. Kaiser Huang 巨匠電腦北區 / 新竹認證中心認證講師國立新竹教育大學數位學習科技研究所在職生微軟原廠認證講師 MCT

黃河凱. Kaiser Huang 巨匠電腦北區 / 新竹認證中心認證講師國立新竹教育大學數位學習科技研究所在職生微軟原廠認證講師 MCT 黃河凱 Kaiser Huang 巨匠電腦北區 / 新竹認證中心認證講師國立新竹教育大學數位學習科技研究所在職生微軟原廠認證講師 MCT 2007-2014 微軟嵌入式系統 TTT 教育認證講師 kai168@gmail.com. MCT, MCITP-SA/EA, MCTS-WS2008/CE6/XPe, LPIC 第一堂 : 系統安裝與升級設定的簡介 全新式安裝的步驟與方法 從 DVD 或 USB

More information

Chapter 7. Signed/Unsigned Binary Numbers. Digital Arithmetic and Arithmetic Circuits. Unsigned Binary Arithmetic. Basic Rules (Unsigned)

Chapter 7. Signed/Unsigned Binary Numbers. Digital Arithmetic and Arithmetic Circuits. Unsigned Binary Arithmetic. Basic Rules (Unsigned) Chapter 7 Digital rithmetic and rithmetic Circuits igned/unsigned inary Numbers igned inary Number: binary number of fixed length whose sign (+/ ) is represented by one bit (usually M) and its magnitude

More information

多元化資料中心 的保護策略 技術顧問 陳力維

多元化資料中心 的保護策略 技術顧問 陳力維 多元化資料中心 的保護策略 技術顧問 陳力維 現代化的資料保護架構 使用者自助服務 任何儲存設備 影響低 多種還原點選擇 (RPO) Application Server 完整全面的雲端整合 Network Disk Target 容易操作與深入各層的報表能力 管理快照與複製能力 Primary Storage 快速 可靠的還原 (RTO) 完整的磁帶 & 複製管理 單一整合的解決方案 企業級的擴充性

More information

落實混合雲 : 協助並加速企業快速轉型 EMC 台灣專業服務協理陳士駿

落實混合雲 : 協助並加速企業快速轉型 EMC 台灣專業服務協理陳士駿 落實混合雲 : 協助並加速企業快速轉型 EMC 台灣專業服務協理陳士駿 Copyright 2016 EMC Corporation. All rights reserved. 1 Last 15 years IT-centric Systems of record Traditional applications Transactional data and reporting Internet

More information

Java 程式設計基礎班 (7) 劉根豪台大電機所網路資料庫研究室. Java I/O. Class 7 1. Class 7

Java 程式設計基礎班 (7) 劉根豪台大電機所網路資料庫研究室. Java I/O.   Class 7 1. Class 7 Java 程式設計基礎班 (7) 劉根豪台大電機所網路資料庫研究室 Email: kenliu@arbor.ee.ntu.edu.tw 1 回顧 Java I/O 2 1 Java Data Structure 動態資料結構 執行的時候可以動態變大或縮小 類型 Linked lists Stacks Queues Binary trees 3 自我參考類別 (self-referential classes)

More information

Chapter 4 (Part IV) The Processor: Datapath and Control (Parallelism and ILP)

Chapter 4 (Part IV) The Processor: Datapath and Control (Parallelism and ILP) Chapter 4 (Part IV) The Processor: Datapath and Control (Parallelism and ILP) 陳瑞奇 (J.C. Chen) 亞洲大學資訊工程學系 Adapted from class notes by Prof. M.J. Irwin, PSU and Prof. D. Patterson, UCB 4.10 Instruction-Level

More information

Invitation to Computer Science 5 th Edition. Chapter 8 Information Security

Invitation to Computer Science 5 th Edition. Chapter 8 Information Security Invitation to Computer Science 5 th Edition Chapter 8 Information Security CIA Triad of Information Security Ensuring that data can be modified only by appropriate mechanisms Ensuring that data is protected

More information

SOHORAID ST8-TB3 User Manual

SOHORAID ST8-TB3 User Manual SOHORAID ST8-TB3 User Manual » ST8-TB3 User Manual...1 1. Environmental Requirements...1 2. Product Appearance and Packaging Content...1 3. Hardware Requirements and Precautions...2 4. Hardware Installation...3

More information

Global Certification Corp.

Global Certification Corp. Report No.: E450201-01 GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC GCC Applicant Address

More information

BTC, EMPREX Wireless Keybaord +Mouse + USB dongle. 6309URF III Quick Installation Guide

BTC, EMPREX Wireless Keybaord +Mouse + USB dongle. 6309URF III Quick Installation Guide BTC, EMPREX 6309URF III Quick Installation Guide Hardware Installation 1. Plug the dongle receiver connector into your available USB port on PC. 2. Make sure the batteries of the keyboard and mouse are

More information

無線寬頻的演進與數位匯流的大未來 台灣大哥大股份有限公司技術群阮得晉副總經理

無線寬頻的演進與數位匯流的大未來 台灣大哥大股份有限公司技術群阮得晉副總經理 無線寬頻的演進與數位匯流的大未來 台灣大哥大股份有限公司技術群阮得晉副總經理 Taiwan Mobile Co. Ltd 2 Global Mobile Broadband Market Example: AT&T AT&T 50x Mobile Data Traffic Increase in Past 3 Years (,000) 5,000 AT&T Mobile Data Traffic Growth,

More information

Ubiquitous Computing Using SIP B 朱文藝 B 周俊男 B 王雋伯

Ubiquitous Computing Using SIP B 朱文藝 B 周俊男 B 王雋伯 Ubiquitous Computing Using SIP B91902039 朱文藝 B91902069 周俊男 B91902090 王雋伯 Outline Ubiquitous Computing Using SIP 1. Introduction 2. Related Work 3. System Architecture 4. Service Example 1. Introduction

More information

ISILON DATA LAKE 運用 ISILON 輕鬆建構企業資料湖

ISILON DATA LAKE 運用 ISILON 輕鬆建構企業資料湖 ISILON DATA LAKE 運用 ISILON 輕鬆建構企業資料湖 EDGE TO CORE TO CLOUD EMC Isilon 資深技術顧問 Frances Chien 簡君芳 1 Isilon 企業資料湖 Consolidated unstructured data storage infrastructure Scale-out architecture to support rapid

More information

微處理機系統 吳俊興高雄大學資訊工程學系. February 21, What are microprocessors (µp)? What are the topics of this course? Why to take this course?

微處理機系統 吳俊興高雄大學資訊工程學系. February 21, What are microprocessors (µp)? What are the topics of this course? Why to take this course? 微處理機系統 吳俊興高雄大學資訊工程學系 February 21, 2005 processor, central processing unit (CPU) A silicon chip which forms the core of a microcomputer The heart of the microprocessor-based computer system Concept of what

More information

報告人 / 主持人 : 林寶樹 Colleges of Computer Science & ECE National Chiao Tung University

報告人 / 主持人 : 林寶樹 Colleges of Computer Science & ECE National Chiao Tung University 行動寬頻尖端技術跨校教學聯盟 - 行動寬頻網路與應用 MiIoT ( Mobile intelligent Internet of Things) 報告人 / 主持人 : 林寶樹 Colleges of Computer Science & ECE National Chiao Tung University Aug 14, 2015 課程簡介 課程綱要 實作平台評估 2 背景說明 目前雲端與行動寬頻緊密結合,

More information

WIN Semiconductors. Wireless Information Networking 穩懋半導體 2014 年第四季法人說明會. p.0

WIN Semiconductors. Wireless Information Networking 穩懋半導體 2014 年第四季法人說明會. p.0 WIN Semiconductors Wireless Information Networking 穩懋半導體 2014 年第四季法人說明會 2015 年 3 月 p.0 免責聲明 本資料可能包含對於未來展望的表述 該類表述是基於對現況的 預期, 但同時受限於已知或未知風險或不確定性的影響 因此實 際結果將可能明顯不同於表述內容 除法令要求外, 公司並無義務因應新資訊的產生或未來事件的發生主動更新對未來展望的表述

More information

User s Manual / 使用手冊 Model : TIP-M200ST-BK

User s Manual / 使用手冊 Model : TIP-M200ST-BK User s Manual / 使用手冊 Model : TIP-M200ST-BK www.mukii.com.tw All Registered Trademarks Belong To Their Respective Companies Copyright 2010 MUKii Technology INC. All Rights Reserved. 01 PACKAGE INCLUDES...2

More information

Clonezilla Live 實務與應用

Clonezilla Live 實務與應用 Clonezilla Live 實務與應用 孫振凱蔡育欽 http://drbl.nchc.org.tw, http://drbl.sourceforge.net http://clonezilla.nchc.org.tw, http://clonezilla.org.tw 國家高速網路與計算中心 National Center for High-Performance Computing (NCHC)

More information

微軟新一代私有雲服務. 利用 Windows Azure Pack 協助企業建構現代化的 IT 服務架構, 提升競爭力降低維運成本. Jason Chou Architect. Nov 7, 2013

微軟新一代私有雲服務. 利用 Windows Azure Pack 協助企業建構現代化的 IT 服務架構, 提升競爭力降低維運成本. Jason Chou Architect. Nov 7, 2013 微軟新一代私有雲服務 利用 Windows Azure Pack 協助企業建構現代化的 IT 服務架構, 提升競爭力降低維運成本 Jason Chou Architect Nov 7, 2013 Agenda Cloud OS Vision Windows Server 2012 R2 New Features Windows Azure Pack Overview Success Case High-performance

More information

虛擬機 - 惡意程式攻防的新戰場. 講師簡介王大寶, 小時候大家叫他王小寶, 長大後就稱王大寶, 目前隸屬一神祕單位. 雖然佯稱興趣在看書與聽音樂, 但是其實晚上都在打 Game. 長期於系統最底層打滾, 熟悉 ASM,C/C++,

虛擬機 - 惡意程式攻防的新戰場. 講師簡介王大寶, 小時候大家叫他王小寶, 長大後就稱王大寶, 目前隸屬一神祕單位. 雖然佯稱興趣在看書與聽音樂, 但是其實晚上都在打 Game. 長期於系統最底層打滾, 熟悉 ASM,C/C++, 王大寶, PK 虛擬機 - 惡意程式攻防的新戰場 講師簡介王大寶, 小時候大家叫他王小寶, 長大後就稱王大寶, 目前隸屬一神祕單位. 雖然佯稱興趣在看書與聽音樂, 但是其實晚上都在打 Game. 長期於系統最底層打滾, 熟悉 ASM,C/C++, 對於資安毫無任何興趣, 也無經驗, 純粹是被某壞人騙上台, 可以說是不可多得的素人講師!! 議程大綱 : 現今的 CPU 都支援虛擬化專用指令集, 讓 VM

More information

混合雲的資料安全保護 架構與策略 資深技術顧問藍基能

混合雲的資料安全保護 架構與策略 資深技術顧問藍基能 混合雲的資料安全保護 架構與策略 資深技術顧問藍基能 AGENDA XtrmeIO&DD 20 倍速備份 EMC Cloud Data Protection Cloud Storage Hybrid Model Born In The Cloud Model VMware vrealized Data Protection Extension Technology Underlying ProtectPoint

More information

Quick Installation Guide for Connectivity Adapter Cable CA-42

Quick Installation Guide for Connectivity Adapter Cable CA-42 9235663_CA42_1_en.fm Page 1 Monday, September 13, 2004 11:26 AM Quick Installation Guide for Connectivity Adapter Cable CA-42 9235645 Issue 1 Nokia, Nokia Connecting People and Pop-Port are registered

More information

Oracle Database 11g Overview

Oracle Database 11g Overview Oracle Database 11g Overview Charlie 廖志華倍力資訊資深系統顧問 Great Year for Oracle Database Database Market Database for SAP 14.3% 48.6% 9% 3% 17% 4% 15.0% 22.0% 67% Oracle IBM Microsoft Other

More information

Digital imaging & free fall of immersed sphere with wall effects

Digital imaging & free fall of immersed sphere with wall effects 量測原理與機工實驗 ( 下 ) 熱流實驗 ( 一 ) Digital imaging & free fall of immersed sphere with wall effects May 14-18, 2012 Objective: This week s lab work has two parts: (1) how to record digital video and convert it

More information

RENESAS BLE 實作課程 Jack Chen Victron Technology CO., LTD 2015 Renesas Electronics Corporation. All rights reserved.

RENESAS BLE 實作課程 Jack Chen Victron Technology CO., LTD 2015 Renesas Electronics Corporation. All rights reserved. RENESAS BLE 實作課程 2016-01-21 Jack Chen Jack.chen@victron.com.tw Victron Technology CO., LTD AGENDA CS+ & Renesas Flash Programmer 安裝 3 Renesas Flash Programmer 燒錄介紹 6 CS+ 介面介紹 11 CS+ 開啟 Project & 使用教學 14

More information

Lomographic Society Taiwan Institute of Creative Industry Design

Lomographic Society Taiwan Institute of Creative Industry Design Lomographic Society Taiwan Institute of Creative Industry Design On 2008.10.07 Allan, PA6971076 Contents 中文摘要 02 Short story of Lomographic Society 03 About Lomographic Society Taiwan 04 Lomo Spirit 06

More information

What is a Better Program?

What is a Better Program? 軟體的特性 What is a Better Program? 軟體之所謂軟 因為沒有 硬性 不可變 不可挑戰的規則 好處 : 彈性很大, 山不轉路轉, 沒有標準答案, 正常運作就好 C++ Object Oriented Programming 壞處 : 很多小問題合在一起不斷放大, 到處藏污納垢, 沒有標準答案, 不知道到底對了沒有 解決方法 Pei-yih Ting Coding styles

More information

JAVA Programming Language Homework V: Overall Review

JAVA Programming Language Homework V: Overall Review JAVA Programming Language Homework V: Overall Review ID: Name: 1. Given the following Java code: [5 points] 1. public class SimpleCalc { 2. public int value; 3. public void calculate(){ value = value +

More information

游家德 Jade Freeman 群智信息 / 敦群數位資深架構顧問

游家德 Jade Freeman 群智信息 / 敦群數位資深架構顧問 游家德 Jade Freeman 群智信息 / 敦群數位資深架構顧問 搜尋對企業的需求方案關係 微軟全面性的搜尋方案及應用價值 Enterprise Search 的基本架構 Microsoft Search Solution 物件模型與客製開發 Microsoft Search Solution 應用與案例 Q&A 每人每天會花 10 分鐘在找企業所需文件, 且還可能找不到! 整合的資料大都雜亂無章,

More information

Johnson Lai. Technical Consultant E: Copyright Fortinet Inc. All rights reserved.

Johnson Lai. Technical Consultant E: Copyright Fortinet Inc. All rights reserved. IPv6 防護管理及控管機制 Johnson Lai Technical Consultant E: clai@fortinet.com Copyright Fortinet Inc. All rights reserved. IPV6 Now! 2 Internet and TCP/IP 1969 ARPANET begins 1981 IPv4 definition (RFC 791) 1983

More information

A n d r o i d Ta b l e t P C

A n d r o i d Ta b l e t P C User Guide for LPT -200AR A n d r o i d Ta b l e t P C Table of Contents 1. Overviewing Product 2. H/W Spec. 3. Wi-Fi Output Power 4. Easy Setting Icons 5. Setting 1. Wi-Fi 2. Bluetooth 3. Airplane mode

More information

VMware vsphere. 零壹科技 Josh.wang VMware Inc. All rights reserved

VMware vsphere. 零壹科技 Josh.wang VMware Inc. All rights reserved VMware vsphere 零壹科技 Josh.wang 2010 VMware Inc. All rights reserved Agenda vsphere Welcome 01. Virtualization 09. High Availability 02. ESXi 10. Fault Tolerance 03. vcenter 11. DRS / DPM 04. vsphere Client

More information

打造新世代企業資料中心 Windows Server 2016 重裝登場. 馮立偉 Hybrid Cloud Lead Microsoft Taiwan

打造新世代企業資料中心 Windows Server 2016 重裝登場. 馮立偉 Hybrid Cloud Lead Microsoft Taiwan 打造新世代企業資料中心 Windows Server 2016 重裝登場 馮立偉 Hybrid Cloud Lead Microsoft Taiwan www.20yearsofwindowsserver.com Windows Server 2016 現今攻擊時程 第一個主機被滲透 網域管理者帳號被破解 攻擊者被發現 24 48 小時 超過 200 天 ( 每個產業不同 ) 攻擊目標及方向

More information

Protech RMA Request Form

Protech RMA Request Form Applied Company: Contact Person: E-mail: DOA NO. (BY PROTECH BU): Serial Warrant No. Model Number y Status 1 2 3 4 5 6 7 Protech RMA Request Form *Defect Description Date: Page:1 of 1 DOA Regular RMA Environmen

More information

Clonezilla 實務技術 孫振凱蔡育欽

Clonezilla 實務技術 孫振凱蔡育欽 Clonezilla 實務技術 孫振凱蔡育欽 http://drbl.nchc.org.tw, http://drbl.sourceforge.net http://clonezilla.nchc.org.tw, http://clonezilla.org.tw 國家高速網路與計算中心 National Center for High-Performance Computing (NCHC) Q2,

More information

User s Manual. Rev. 1.04

User s Manual. Rev. 1.04 EZCast Wire User s Manual Rev. 1.04 Introduction Thanks for choosing EZCastseries product, the EZCast Wire is the latest innovation of EZCast. It is based on popular EZCastapp and modified for Wired connection

More information

Simulation of SDN/OpenFlow Operations. EstiNet Technologies, Inc.

Simulation of SDN/OpenFlow Operations. EstiNet Technologies, Inc. Simulation of SDN/OpenFlow Operations EstiNet Technologies, Inc. Agenda: (1) 模擬器簡介 (2) 模擬器的基本操作 (3) 如何建置一個 SDN Topology (5) 如何下達指令並觀察 Flow Table, Group Table 與 Meter Table (5) 如何用 SDN 下達 QoS 指令並觀察結果 (6)

More information

Operating manual. LawMate WN7911B-ZZ. WiFi Module V 01

Operating manual. LawMate WN7911B-ZZ. WiFi Module V 01 羅美國際有限公司 /LawMate International Co., Ltd. 台北市內湖區文湖街 60 巷 34 號 3 樓 /3F, No.34, Lane 60, Wenhu St., Taipei, Taiwan TEL:+886 2-8797-5728 / FAX:+886 2-8797-5727 Operating manual Operating manual LawMate WN7911B-ZZ

More information

Mid-term EXAM. 11/14/2009

Mid-term EXAM. 11/14/2009 Mid-term EXAM. 11/14/2009 1. (15%) Data Compression a) Encode the following characters using Huffman coding with the given frequencies: A(12), B(8), C(9), D(20), E(31), F(14), G(8) (-1 point if theree

More information

WHD0110 (RoHS) SmartRouter IAD

WHD0110 (RoHS) SmartRouter IAD WHD0110 (RoHS) SmartRouter IAD Quick Guide Version released: 1.0 i TABLE OF CONTENTS Before You Use... 3 Unpacking... 3 Chapter 1: Overview... 4 Physical Outlook... 4 Chapter 2 : System Requirement and

More information

ICP Enablon User Manual Factory ICP Enablon 用户手册 工厂 Version th Jul 2012 版本 年 7 月 16 日. Content 内容

ICP Enablon User Manual Factory ICP Enablon 用户手册 工厂 Version th Jul 2012 版本 年 7 月 16 日. Content 内容 Content 内容 A1 A2 A3 A4 A5 A6 A7 A8 A9 Login via ICTI CARE Website 通过 ICTI 关爱网站登录 Completing the Application Form 填写申请表 Application Form Created 创建的申请表 Receive Acknowledgement Email 接收确认电子邮件 Receive User

More information

USER GUIDE. EZ Switch TM 10/100/ Port Gigabit Ethernet Switch SMCGS805

USER GUIDE. EZ Switch TM 10/100/ Port Gigabit Ethernet Switch SMCGS805 USER GUIDE EZ Switch TM 10/100/1000 8-Port Gigabit Ethernet Switch SMCGS805 EZ Switch TM 10/100/1000 User Guide From SMC s EZ line of low-cost workgroup LAN solutions No. 1, Creation Road III, Hsinchu

More information

Business Networking Solution. Installation Guide. Auranet Wireless Controller AC500/AC50

Business Networking Solution. Installation Guide. Auranet Wireless Controller AC500/AC50 Business Networking Solution Installation Guide Auranet Wireless Controller AC500/AC50 About this Installation Guide This Installation Guide describes the hardware characteristics, installation methods

More information

2009 OB Workshop: Structural Equation Modeling. Changya Hu, Ph.D. NCCU 2009/07/ /07/03

2009 OB Workshop: Structural Equation Modeling. Changya Hu, Ph.D. NCCU 2009/07/ /07/03 Amos Introduction 2009 OB Workshop: Structural Equation Modeling Changya Hu, Ph.D. NCCU 2009/07/02- 2 Contents Amos Basic Functions Observed Variable Path Analysis Confirmatory Factor Analysis Full Model

More information

WriteAhead 遨遊雲端暨 行動學習應 用 研討會 雲端時代的資訊教育與語 言學習 介紹互動式寫作環境 張俊盛 清華 大學資訊 工程系及研究所 2015 年 4 月 21 日 ( 二 ) 上午 10:00 ~ 12:30 台北市 立 大同 高中 行政 大學 5 樓階梯教室

WriteAhead 遨遊雲端暨 行動學習應 用 研討會 雲端時代的資訊教育與語 言學習 介紹互動式寫作環境 張俊盛 清華 大學資訊 工程系及研究所 2015 年 4 月 21 日 ( 二 ) 上午 10:00 ~ 12:30 台北市 立 大同 高中 行政 大學 5 樓階梯教室 遨遊雲端暨 行動學習應 用 研討會 雲端時代的資訊教育與語 言學習 介紹互動式寫作環境 WriteAhead 張俊盛 清華 大學資訊 工程系及研究所 2015 年 4 月 21 日 ( 二 ) 上午 10:00 ~ 12:30 台北市 立 大同 高中 行政 大學 5 樓階梯教室 高中資訊教育 培養現代公 民的資訊素養 並不是如何使 用 生產 力軟體 也不只是寫程式 了解現在商業軟體並 非唯 一的選擇,

More information

User Guide. 3D Camera

User Guide. 3D Camera User Guide 3D Camera Over View Weeview's SID Camera offers high resolution 3D video and 3D photo, and live stream in 3D with compatible streaming software. Viewers can truly re-live and re-define the experience.

More information

網路安全與頻寬控制閘道器之實作與研究. Management Gateways

網路安全與頻寬控制閘道器之實作與研究. Management Gateways 行政院國家科學委員會補助專題研究計畫成果報告 網路安全與頻寬控制閘道器之實作與研究 Implementation and Research of Security and Bandwidth Management Gateways 計畫類別 : 個別型計畫 整合型計畫 計畫編號 :NSC 90-2213-E-009-161- 執行期間 : 2001 年 08 月 01 日至 2002 年 7 月 31

More information